1 // SPDX-License-Identifier: GPL-2.0
2 /* Copyright (c) 2021 Facebook */
3 #include <test_progs.h>
4 #include "syscall.skel.h"
15 static void test_syscall_load_prog(void)
17 static char verifier_log[8192];
20 .log_buf = (uintptr_t) verifier_log,
21 .log_size = sizeof(verifier_log),
23 LIBBPF_OPTS(bpf_test_run_opts, tattr,
25 .ctx_size_in = sizeof(ctx),
27 struct syscall *skel = NULL;
28 __u64 key = 12, value = 0;
31 skel = syscall__open_and_load();
32 if (!ASSERT_OK_PTR(skel, "skel_load"))
35 prog_fd = bpf_program__fd(skel->progs.load_prog);
36 err = bpf_prog_test_run_opts(prog_fd, &tattr);
37 ASSERT_EQ(err, 0, "err");
38 ASSERT_EQ(tattr.retval, 1, "retval");
39 ASSERT_GT(ctx.map_fd, 0, "ctx.map_fd");
40 ASSERT_GT(ctx.prog_fd, 0, "ctx.prog_fd");
41 ASSERT_OK(memcmp(verifier_log, "processed", sizeof("processed") - 1),
44 err = bpf_map_lookup_elem(ctx.map_fd, &key, &value);
45 ASSERT_EQ(err, 0, "map_lookup");
46 ASSERT_EQ(value, 34, "map lookup value");
48 syscall__destroy(skel);
57 static void test_syscall_update_outer_map(void)
59 LIBBPF_OPTS(bpf_test_run_opts, opts);
63 skel = syscall__open_and_load();
64 if (!ASSERT_OK_PTR(skel, "skel_load"))
67 prog_fd = bpf_program__fd(skel->progs.update_outer_map);
68 err = bpf_prog_test_run_opts(prog_fd, &opts);
69 ASSERT_EQ(err, 0, "err");
70 ASSERT_EQ(opts.retval, 1, "retval");
72 syscall__destroy(skel);
75 void test_syscall(void)
77 if (test__start_subtest("load_prog"))
78 test_syscall_load_prog();
79 if (test__start_subtest("update_outer_map"))
80 test_syscall_update_outer_map();